1.
CGI scripts are susceptible to which of the following types of attacks?
2.
Which of the following is the BEST place to obtain a hotfix or patch for an application or system?
3.
Which of the following would be the minimally acceptable method of ensuring that a disposed hard drive does not reveal sensitive data?
4.
A public key _____________ is a pervasive system whose services are implemented and delivered using public key technologies that include Certificate Authority (CA), digital certificates, non-repudiation, and key history management.
5.
From the list of protocols, which is used to secure web transactions?
6.
Which of the following is a common type of attack on web servers?
7.
Which of the following is the BEST description of the basic elements of virtualization?
8.
Stateful packet inspection is a methodology used by:
9.
Which of the following types of authentication BEST describes providing a username, password and undergoing a thumb print scan to access a workstation?
10.
A representative from the human resources department informs a security specialist that an employee has been terminated. Which of the following would be the BEST action to take?